Skip to content
Securing 365 Securing 365

Secure Your Microsoft 365 Investment

  • Home
  • About
  • Contact Us
  • Home
  • About
  • Contact Us
  • YouTube
  • LinkedIn
Subscribe on YouTube
  • Home
  • Devices
How to Protect Your M365 Network Traffic
Posted inDevices Entra Suite How To Multifactor Authentication Security Security Keys SSE

How to Protect Your M365 Network Traffic

Posted by By Cody McLees April 29, 2025
As organizations continue to embrace cloud-first strategies, securing traffic between users and Microsoft 365 services…
Read More
Manually Onboard Debian to Defender for Endpoint Quickly & Easily
Posted inDevices How To Security XDR

Manually Onboard Debian to Defender for Endpoint Quickly & Easily

Posted by By Cody McLees March 28, 2025
Microsoft Defender for Endpoint (MDE) provides advanced threat protection for your Linux workloads, including linux-based…
Read More
Foundational Security in Microsoft 365: Entra ID Plan 1
Posted inDevices Multifactor Authentication Security Security Keys

Foundational Security in Microsoft 365: Entra ID Plan 1

Posted by By Cody McLees March 25, 2025
Introduction Identity security is and should be at the forefront of the strategy of IT…
Read More
Secure Your Device Code Auth Flows NOW!
Posted inDevices How To Multifactor Authentication Security SSE

Secure Your Device Code Auth Flows NOW!

Posted by By Cody McLees February 27, 2025
Did you read the title and not know what device code auth flows are in…
Read More
How to:  Protect RDP with Microsoft Entra ID PIM and Entra Suite
Posted inDevices Entra Suite How To Multifactor Authentication PIM Security SSE

How to: Protect RDP with Microsoft Entra ID PIM and Entra Suite

Posted by By Cody McLees January 13, 2025
RDP - the tool all sysadmins use, but also the tool and protocol that is…
Read More
Are you ready for Windows 11?  October of 2025 is coming quickly!
Posted inDevices How To Security

Are you ready for Windows 11? October of 2025 is coming quickly!

Posted by By Cody McLees December 19, 2024
And just like that we are in the timing window of another operating system to…
Read More
Understanding Token Theft in Microsoft 365: Risks, Prevention, and Best Practices
Posted inDevices Multifactor Authentication Security XDR

Understanding Token Theft in Microsoft 365: Risks, Prevention, and Best Practices

Posted by By Cody McLees October 18, 2024
Introduction About 2 years ago I recorded a video for some colleagues showing just how…
Read More

Don't miss out on our latest posts!  Subscribe below for email notifications.

Recent Posts

  • How to Protect Your M365 Network Traffic
  • Get Started with Microsoft Sentinel for Free!
  • Manually Onboard Debian to Defender for Endpoint Quickly & Easily
  • Foundational Security in Microsoft 365: Entra ID Plan 1
  • Secure Your Device Code Auth Flows NOW!

Recent Comments

No comments to show.

Archives

  • April 2025
  • March 2025
  • February 2025
  • January 2025
  • December 2024
  • November 2024
  • October 2024
  • September 2024
  • August 2024

Categories

  • Artificial Intelligence
  • Devices
  • Email Security
  • Entra Suite
  • How To
  • Multifactor Authentication
  • PIM
  • Security
  • Security Keys
  • SIEM
  • SOAR
  • SSE
  • Uncategorized
  • XDR
Search
Categories
  • Artificial Intelligence
  • Devices
  • Email Security
  • Entra Suite
  • How To
  • Multifactor Authentication
  • PIM
  • Security
  • Security Keys
  • SIEM
  • SOAR
  • SSE
  • Uncategorized
  • XDR
Archives
  • April 2025
  • March 2025
  • February 2025
  • January 2025
  • December 2024
  • November 2024
  • October 2024
  • September 2024
  • August 2024
Copyright 2025 — Securing 365. All rights reserved.
Scroll to Top
×

Privacy Policy - Terms and Conditions

WordPress Appliance - Powered by TurnKey Linux